How are users associated to service principals?

Hello,
I am trying to implement Kerberos authentication on a Windows machine and have trouble understanding how users are mapped to service principals.
I understand that the ktpass or Setspn tools are used to associate a service principal to an Active Directory account because a service that is being secured by Kerberos needs to be mapped to an Active Directory account(e.g. account X). So, when executing a command from either one that account X only is mapped to the service principal.
Now, say user user1 having account Y tries to access the service corresponding to the above service principal.
My question is how does Kerberos know that account Y is allowed to access the secured application? How can I associate account Y with the above principal?
Thank you,
Savvas.

savvas.andreas wrote:
right..I think I see what you mean. So, it is true then that any user who has logged on to his/her windows account can access any application on the domain they've logged on to because they are authenticated against that domain?Yes, that is correct if no further action is taken.
One thing that still confuses me though is why does that second phase in Kerberos authentication needs to be applied? What I mean is that from what I was able to read, at a very generic level, Kerberos employs a two-phase process:In the first phase the client authenticates itself through the "Authentication Service" of the "Key Distribution Centre" and receives back a Ticket Granting Ticket (TGT). But then, in the second phase the same client requests a "Service Ticket" from the "Ticket Granting Service" of the "Key Distribution Centre" by presenting the TGT acquired earlier. If any authenticated user is allowed to access any resource why is that second phase (specific to the service for which access is requested) necessary? wouldn't just the first authentication phase suffice?
I appreciate your solution and it's something we also considered initially but we were hoping Kerberos would provide this process for us :)No it wouldn't. After the first phase the client is only known to the KDC. No service is aware of any client. With the creation of a specific service ticket the service knows that the user is seriously trustworthy. Kerberos is based on a shared secret which means only the KDC knows that the client and user are real. The KDC acts as a trusted 3rd party. That's why all import authn goes thru it. Read this artice for further clarification: [http://simple.wikipedia.org/wiki/Kerberos_%28protocol%29]

Similar Messages

  • How are user groups defined in Mac OS 10.x

    Thus far, my guess is that Mac OS determines which users are members of particular pre-defined groups.
    For example, if I want to give other users in my home network read and write permissions to a particular folder, I might add the pre-defined group 'netuser' to group in the get info window and give the group right and write permissions.
    I am correct in this?
    I used to administer a Windows NT server and workstations and could give permissions to domain users, as opposed to local users on the various machines.
    I imagine it might be pretty much the same if I had Macintosh server software installed or whatever.
    My chief concern is understanding permissions in relation to Qmaster distributed processing with a home network.
    Advice and clarifications are most welcome.
    --Cris

    Thanks for the link to the ars tecnica site article on permissions and acl's.
    Actually, I am quite happy with Unix group limitations. I am just still trying to understand how to create a group, and users to the group, and to control how new folders and files are given permissions inside their parent folders.
    Can you recommend an article that explains how to create new groups, and associate users with groups?
    I now have a case where I am trying to figure out how to use QMaster for distributed processing. I was observing problems writing to the second computer, a service node. Even when the first machine, client and cluster controller, was not listed in the upper pane of QAdmin as belonging to the cluster, cluster storage would default to the first machine. So, I made the second machine a cluster controller and service node as well, and sent a job from my first computer, the client, to a cluster that only had the second computer. This worked. Only problem, is that the new folders and file written in the cluster storage assigned to a folder on the second computer have ownership and group changed to the user which is my log in (admin) on the first computer. That in itself wouldn't necessarily be a problem save that I cannot delete the files from the first machine as my account doesn't have necessary permissions. Perhaps that is because earlier, in a botched effort to get Qmaster to work for me, I had created a local account on the second machine with the same name as my admin account on the first machine. That account is now deleted, and I have reset Qmaster preference many times since then, so this is may be a red herring.
    The Apple document "Distributed Processing Set-up" says:
    "All the computers in a cluster need Read and Write access to any computers (or storage devices) that will be specified as output destinations for files."
    I'm just not sure how to go about that.
    Thanks,
    Cris

  • How are user-entered MIME applications defined to open certain file types. This used to be standard in browsers.

    In the not-terribly-recent past, browser Preferences allowed users to create associations between a file type (really, a file extension indicating its type) with an application used to run that type of file. Firefox seems to have buried this (on the Mac) in ~/Library/Application Support/Firefox/... ;in which seem to be an xml file.
    Is it possible to edit this xml file directly, and if so, where in the xml file should a new entry be placed, and what is the explicit syntax of an entry (other than obviously copying present entries)?
    These used to be called MIMEs.

    I am trying to use a rather older programming language called Mozart, an extension of OZ. I installed it as a binary, but instead of storing its component binaries in a place like /usr/local/oz/bin/. they are all enclosed inside the /Applications/Mozart.app/Contents/Resources/bin/. which cannot be opened nor can a soft link be made to it located outside the Mozart.app wrapper.
    The only alternative is to try to edit the mimeTypes.rdf files, and give it the full path name to the inside of Mozart.app were the program used for web applications is stored. It is stored in ~/Library/Application Support/Mozart/, which can only be accessed in more recent Mac OS X by going to finder and holding the Option key while opening the Go menu; this will make the ~/Library visible and accessible.

  • How are users getting the flashback virus

    I don't have a virus, but I sure don't want to expose my computer.  So how is the virus downloaded?  What do I watch out for?

    Mac OS X versions 10.6.7 and later have built-in detection of known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    The most effective defense against malware is your own intelligence. All known malware that affects an up-to-date Mac OS system takes the form of trojans that can only operate if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown site, merely in order to use the site, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim.
    “Cracked” versions of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Disable Java (not JavaScript) in your web browser(s). Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in Mac OS X 10.5.8 or earlier, because Java in those versions has bugs that make it unsafe to use on the Internet. Those bugs will probably never be fixed.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use ClamXav — nothing else.

  • How are users provisioned?

    User's are provisioned through LDAP. In a standard configuration in which Sun ONE Messaging Server 5.X is the mail server, users would typically be provisioned using Sun ONE Delegated Admin (iDA). iDA creates users in LDAP. In a portal server deployment, the portal administrator would provision users with the Identity Server Console which uses an internal LDAP directory to provision users.

    Hi aapl.crox have a look at this pdf and use it as a guide, it is written for tiger but should be basically the same.
    http://www.wazmac.com/quickstarts/pdf/osxserver/tiger/090_clientsetup.pdf
    There is also some 10.5 documentation here http://www.wazmac.com/serversnetwork/fileservers/osxserver_setup/osxserver105setup.htm that is worth looking at too.
    Cheers.

  • How are user points calculated? I'm missing some.

    Recently I noticed that my user points is at 0, which odd because I've been around for a bit, and I know I've made at least one contribution to the community. So I looked up a discussion I was on where I had given a correct answer. I also took a screenshot. Its pretty funny, because something just doesn't add up at all.

    There is/was a known bug during the change-over from AD to ASC. Several of us actually LOST points! On the last day of AD, Friday April 15, 2011, I had 515 points. On Saturday night, April 16th, when ASC went live, I now had only 505 points! Anyway, I've earned a further 30 points in the last month, so I'm now at 530. There is a thread on this:  https://discussions.apple.com/thread/3002188
    Since you answered the question while we were still under AD, the suggestion that you marked your own post as "Correct" is invalid as that was impossible to do under the AD system. That ability was added as part of ASC but it does not earn you points.
    So what can you do? Well, hopefully a host will see this and correct it, but don't hold your breathe. I'm STILL waiting to hear back from them myself about my missing 10 points.

  • User Profile Services:How get to know how many user are using my site.

    Hi,
    User Profile Services:How get to know how many user are using my site.
    Recently i have done migration sharepoint 2010 to sharepoint 2013,I did not migrate USer profile services because less user are using user profile here,but i need to know how many few uer are using my site for data store.
    Is any why we can get to know  user name who are using my site document library and other things.
    Hasan Jamal Siddiqui(MCTS,MCPD,ITIL@V3),Sharepoint and EPM Consultant,TCS
    |
    | Twitter

    Fallowing command shows only count of my site user ,I need to know how many upload data on my site
    Hasan Jamal Siddiqui(MCTS,MCPD,ITIL@V3),Sharepoint and EPM Consultant,TCS
    |
    | Twitter

  • How many users are registered for using the firefox sync server?

    I'm working on a german wikipedia article about "Firefox Sync" and I need more information about the current usage and the historical development of this feature - number of registered users for the Sync Server at Mozilla - would be nice to have numbers for 2011, 2012, and current usage.
    If possible, it would be also useful to know how many german speaking users are using the sync service.
    Where are your Sync Servers located (US, Europe, Asia)?
    What kind of systems and platforms are supported?
    Is there a current documentation about the importance of the Firefox Sync Service, that I may reference?

    thanks for your fast reply,
    your URL to the page with the ideas of the new PiCL service shows in the remark about the usability of the "Firefox Sync" some hints about the usage of the current sync service "only 1% of our users have actually done so" - so I will use that as reference.
    But it would be nicer to have some public message - for example: a mozilla blog entry - from the mozilla services group about the number of registered Sync Server User - and also about performance and reliabilty.
    But if that is private information only, you can close this problem.

  • How the user credentials are transported using BusinessObjects SDK

    Hi, I would like to know in detail how the user credentials is passed with the java call (logon). Are they encrypted during the transport? Which mechanism (protocol, technology) does the sdk use to provide security for the user credentials?
    Thanks

    The BusinessObjects Enterprise SDK communicates with BusinessObjects Enterprise servers using a proprietary CORBA framework via TCP/IP. 
    This is so inter-server and server-client communication can be done transparently from the perspective of the API whether all services are on one or multiple machines.
    You can configure BusinessObjects Enterprise services to use SSL through this communication.  How you would do so is described in the Admin Guide.
    You'd configure the SDK as you would the servers in as described in the Admin Guide.
    For the BusinessObjects Enterprise Java SDK, that means specifying the four Java System Properties (as you would for Java InfoView) to point to the SSL configuration files.
    That takes care of the connection from the SDK to Enterprise.
    Set-up of secure communication from web browser to web app using the SDK is a separate matter.
    By the way, the BusinessObjects Enterprise SDK is fully tested an supported only when used in a web application.  Desktop and standalone apps using the Enterprise SDK are untested.
    Sincerely,
    Ted Ueda

  • How do I set up family sharing if all my family members emails are already associated with my iTunes account?

    I want to set up family sharing but it won't let me because all the emails are already associated with the one iTunes account we have.  I am afraid to delete because my children use that email address for text messaging.  How do I set up family sharing if all my family members emails are already associated with my iTunes account?

    Hey Wendaroski,
    I am not quite sure what you mean by "my family members emails are already associated with my iTunes account" but what you need for each family member is an Apple ID. Yours would be the one for your iTunes account.
    If the other members of the family already have an Apple ID you can invite them to join the family group. If not they will need to create one, using their email address. This article shows how -
    Set up an Apple ID in iTunes - Apple Support
    Thanks for using Apple Support Communities.
    Be well,
    Brett L 

  • How to get system status and user status of service order

    Hi,
    I want to show user status and system status for service order in my report and i am using CRM_ORDER_READ function module to read the status, but it is returning lot of status records, could anyone please suggest how to get the system status and user status for service order.
    I did not find any clue for how to get user status, i can see the user status when i open the transaction using CRMD_ORDER.
    Regards,
    Kamesh Bathla

    Hi,
      Go to CRM_JEST table give your service order guid and get the status, pass this status into TJ02. You will get the status of your order.
    Regards
    Srinu

  • How many users are there of Logic?

    does anyone know where I can find out how many users there are globally of Logic Pro. I'm doing an assignment on this and I can find sales figures for DAW software anywhere....

    You can or can't find sales figures?
    It is also rumoured that there are many non legitimate users out there too. Please note however, I am not one of those.
    Anyway, what is the assignment for? ie What's the gist, requirements and subject matter? Just interested.
    Regards,
    Matt

  • How to see how many users are working on a Dynpro application?

    Hello,
    Is it possible to see somwhere at the portal or on the WAS how many users are currently working with my Web Dynpro application?

    Hi Roy,
    I know it isn' exactly what you want but if you got to:-
    System Administration->Support->Web Dynpro Test Tools->User Management
    you can at least see the users currently running Web Dynpro applications (I think!)
    At least its a start!
    Cheers,
    Gareth.

  • How many users world wide are on Skype?

    Hi, How can you see how many users world wide that are registrered om Skype today?

    Hi,
    Typing  /users  in a chat field should do the trick.
    Hth
    On ne regarde pas l'avenir dans un rétroviseur !
    IMac Intel Core i3 3.2 GHz - RAM 12 GB - OS 10.10.3
    Skype 7.8.391
    Logitech usb headset or Jabra 250 bt

  • How many users are working on EBS

    is it possible to find out how many users are currenlty at the same time working on EBS.
    Like how many payable users, mfg uers OTL users.

    Hi,
    Below sql will find how many users are currently working on EBS,
    SELECT distinct icx.session_id, icx.user_id, fu.user_name, fu.description
    FROM icx_sessions icx, fnd_user fu
    WHERE disabled_flag != 'Y'
    AND icx.pseudo_flag = 'N'
    AND ( last_connect + DECODE (fnd_profile.VALUE ('ICX_SESSION_TIMEOUT'),
    NULL, limit_time, 0, limit_time, fnd_profile.VALUE ('ICX_SESSION_TIMEOUT') / 60 ) / 24) > SYSDATE
    AND icx.counter < limit_connects
    AND icx.user_id = fu.user_id
    order by 4;
    Thanks,
    Amogh

Maybe you are looking for

  • How to remove the the standard button APPEND/INSERT/DELETE in webdynpro alv

    Hello, how to remove the the standard button APPEND/INSERT/DELETE in webdynpro-abap  alv Thanks Rakshar

  • MacBook Pro 17" (Late 2011) Graphics Card

    Hello Community, I've researched this community, and found some relevant posts to the following question. However, the answers I found weren't completely satisfying. So, I'm posting my own on the subject to help me and others. I have the following: •

  • Active x in forms 4.5

    i would like to put progress bar in my application. i didnt find help about this. can any body tell me which active-x control can be used for this, and where can i get.

  • Wont update message displays: An error has occured while downloading software .......

    please help!!  Iam trying to update my playbook 16GB but each time i accept and try to apply the update i get a pop up in middle of screen saying: An error has occured while downloading software for your device. Please verify your internet connection

  • Data Integrator Job execution ERROR

    I tried to execute a job which is compiled and error free but get the error below has any one of you any workaround for this problem 5308     4880     PAR-010102     12.12.2007 08:44:52     |SessionJOB_XYZ 5308     4880     PAR-010102     12.12.2007